This message informs you that the IP packet fragments arriving from the host 220.127.116.11 are overlapping, i.e. if the packet was to be put back together, parts of it would overlap and overwrite each other. The VFR (Virtual Fragmentation and Reassembly) is a feature on Cisco routers that keeps track of fragmented packets so that they can pass ACL checks as if they were unfragmented.
Overlapping fragments are most often caused by malicious intents, as correct IP packet fragmentation will never produce overlapping fragments. You can assume that either the 18.104.22.168 is intentionally creating a stream of overlapping fragments to confuse and/or interfere with the correct operation of the 22.214.171.124 (and routers/firewalls inbetween), or some device on the route between these two hosts has a faulty IP driver that creates overlapping fragments.
In any case, there is nothing you can do about it. It is not your fault, and the router is merely informing you about a suspicious flow of IP packets.
I am afraid you can't do much against the occurence of fragmented packets. You can try entering the following command on your IP-enabled interfaces:
no ip virtual-reassembly
This will deactivate the VFR functionality. You can safely do this if you are not using any ACLs on the affected device. If you do happen to use ACLs, you can use the command as well but you should keep an watchful eye on the traffic after deactivating the VFR, as some (fragmented) traffic may get incorrectly denied or permitted.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...